schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109273",
"label": "benign",
"label_confidence": 0.727,
"severity": "critical",
"timestamp": "2026-01-07T10:33:00Z",
"trace_id": "ba490471-9d5e-56ef-5436-4f3b44ca61ba"
} | {
"account_age_days": 131,
"account_id": "ACCT-E318DC185E94",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_1",
"session_entropy": 0.436
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 363,
"timestamp": "2026-01-06T22:40:00Z",
"transaction_amount_usd": 23.49
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.768,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 279.41,
"financial_exposure_usd": 290.3,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101475",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "medium",
"timestamp": "2026-01-02T00:35:00Z",
"trace_id": "eeb50c12-99ae-7580-ba5a-cc371907f4e4"
} | {
"account_age_days": 1446,
"account_id": "ACCT-4FE16C0FFEF7",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_1",
"session_entropy": 0.739
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 156,
"timestamp": "2026-01-02T00:35:00Z",
"transaction_amount_usd": 56466.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.439,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 392150.78,
"financial_exposure_usd": 466965.11,
"recoverable_pct": 0.42
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102082",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-02T10:42:00Z",
"trace_id": "02455c42-5900-6f3a-80eb-388f284b9133"
} | {
"account_age_days": 1082,
"account_id": "ACCT-A75E412E088C",
"baseline_risk_score": 0.513,
"kyc_tier": "tier_2",
"session_entropy": 0.502
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 227,
"timestamp": "2026-01-02T08:25:00Z",
"transaction_amount_usd": 4.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.812,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 519771.8,
"financial_exposure_usd": 592886.7,
"recoverable_pct": 0.193
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106303",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "medium",
"timestamp": "2026-01-05T09:03:00Z",
"trace_id": "e8c23a36-f04a-1f14-59e3-e8e15bce1572"
} | {
"account_age_days": 241,
"account_id": "ACCT-24A99CA7A864",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.444
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 341,
"timestamp": "2026-01-05T09:03:00Z",
"transaction_amount_usd": 799998.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.365,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3539708.73,
"financial_exposure_usd": 5209232.1,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102302",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "high",
"timestamp": "2026-01-02T14:22:00Z",
"trace_id": "eca01265-86c0-004f-b9d8-280fdee0bce0"
} | {
"account_age_days": 1868,
"account_id": "ACCT-31398969D99F",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_3",
"session_entropy": 0.709
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1200,
"timestamp": "2026-01-02T14:22:00Z",
"transaction_amount_usd": 36975.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.38,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 988211.99,
"financial_exposure_usd": 1282448.68,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105017",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "medium",
"timestamp": "2026-01-04T11:37:00Z",
"trace_id": "b5113c7b-aa6b-ac9a-1d7b-902da81b3cd6"
} | {
"account_age_days": 853,
"account_id": "ACCT-EB9D7E2E20F0",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_2",
"session_entropy": 0.94
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 955,
"timestamp": "2026-01-04T11:37:00Z",
"transaction_amount_usd": 2961825.41
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.911,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3240359.78,
"financial_exposure_usd": 4274856.24,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108923",
"label": "benign",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-07T04:43:00Z",
"trace_id": "07c01adc-17c4-8e7f-c1be-3e112ec5dc96"
} | {
"account_age_days": 1872,
"account_id": "ACCT-CA49CA25874E",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_1",
"session_entropy": 0.575
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 931,
"timestamp": "2026-01-07T04:43:00Z",
"transaction_amount_usd": 7958.05
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.695,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 8465.42,
"financial_exposure_usd": 8834.63,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102370",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "critical",
"timestamp": "2026-01-02T15:30:00Z",
"trace_id": "604b4bc9-f10b-3ef1-4cb5-4e1ee961b74b"
} | {
"account_age_days": 1616,
"account_id": "ACCT-292E887D6DAE",
"baseline_risk_score": 0.627,
"kyc_tier": "tier_1",
"session_entropy": 0.196
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 850,
"timestamp": "2026-01-02T15:30:00Z",
"transaction_amount_usd": 91611.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.667,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 615233.87,
"financial_exposure_usd": 758389.79,
"recoverable_pct": 0.373
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104643",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "high",
"timestamp": "2026-01-04T05:23:00Z",
"trace_id": "e919357a-83ae-a2e8-cdd1-bae64d62e11c"
} | {
"account_age_days": 829,
"account_id": "ACCT-7BE9EFE0CF72",
"baseline_risk_score": 0.208,
"kyc_tier": "tier_1",
"session_entropy": 0.553
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 111,
"timestamp": "2026-01-04T05:23:00Z",
"transaction_amount_usd": 1136271.86
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.49,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 5465163.04,
"financial_exposure_usd": 5749975.5,
"recoverable_pct": 0.67
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105321",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "medium",
"timestamp": "2026-01-04T16:41:00Z",
"trace_id": "5ee46c23-5926-a014-3368-9f03ae9bc3a3"
} | {
"account_age_days": 304,
"account_id": "ACCT-1BDD38DDC340",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_1",
"session_entropy": 0.602
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 634,
"timestamp": "2026-01-04T16:41:00Z",
"transaction_amount_usd": 766034.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.831,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1538573.62,
"financial_exposure_usd": 2649933.12,
"recoverable_pct": 0.959
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105069",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-04T12:29:00Z",
"trace_id": "54cc3724-654f-6cce-df38-018086cd6b47"
} | {
"account_age_days": 559,
"account_id": "ACCT-7AF70252A386",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_2",
"session_entropy": 0.349
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 442,
"timestamp": "2026-01-04T12:29:00Z",
"transaction_amount_usd": 539775.78
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.803,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1542196.66,
"financial_exposure_usd": 2762308.76,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109902",
"label": "benign",
"label_confidence": 0.747,
"severity": "high",
"timestamp": "2026-01-07T21:02:00Z",
"trace_id": "1d55e2df-2fe5-2f6e-8a96-8528a6043cfe"
} | {
"account_age_days": 1542,
"account_id": "ACCT-4268B2B4A6C4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.174
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 610,
"timestamp": "2026-01-07T21:02:00Z",
"transaction_amount_usd": 12616.16
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.641,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1154.04,
"financial_exposure_usd": 2761.04,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108420",
"label": "benign",
"label_confidence": 0.474,
"severity": "medium",
"timestamp": "2026-01-06T20:20:00Z",
"trace_id": "57e5d207-1921-2533-a63b-749e6f16d23e"
} | {
"account_age_days": 1933,
"account_id": "ACCT-5FAD94D6CB9A",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.102
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 237,
"timestamp": "2026-01-06T17:02:00Z",
"transaction_amount_usd": 14.01
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1636.2,
"financial_exposure_usd": 1761.47,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101216",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "high",
"timestamp": "2026-01-01T20:16:00Z",
"trace_id": "217baf81-12cd-d7f1-8d53-77e47784d531"
} | {
"account_age_days": 1137,
"account_id": "ACCT-9FB3C167562B",
"baseline_risk_score": 0.578,
"kyc_tier": "tier_1",
"session_entropy": 0.251
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1063,
"timestamp": "2026-01-01T20:16:00Z",
"transaction_amount_usd": 109239.04
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.458,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 493973.37,
"financial_exposure_usd": 637673,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105221",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-04T15:01:00Z",
"trace_id": "c35ffe5e-6c9b-791e-35e0-c339edcd4e31"
} | {
"account_age_days": 1602,
"account_id": "ACCT-317718E4DE40",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_3",
"session_entropy": 0.444
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 110,
"timestamp": "2026-01-04T15:01:00Z",
"transaction_amount_usd": 210673.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.863,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 9052423.77,
"financial_exposure_usd": 9397190.2,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105108",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "medium",
"timestamp": "2026-01-04T13:08:00Z",
"trace_id": "30d9e758-d7df-ad32-6509-6de8f857a58d"
} | {
"account_age_days": 750,
"account_id": "ACCT-9C9FCD8C4140",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_3",
"session_entropy": 0.646
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 947,
"timestamp": "2026-01-04T13:08:00Z",
"transaction_amount_usd": 1752980.08
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7247486.15,
"financial_exposure_usd": 10005957.41,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105007",
"label": "fraudulent",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-04T11:27:00Z",
"trace_id": "6ae33458-2c82-d874-97fe-e50a5f398b9f"
} | {
"account_age_days": 1484,
"account_id": "ACCT-342A917080ED",
"baseline_risk_score": 0.223,
"kyc_tier": "tier_2",
"session_entropy": 0.596
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 779,
"timestamp": "2026-01-04T11:27:00Z",
"transaction_amount_usd": 1680626.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.864,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 855485.31,
"financial_exposure_usd": 1000676.28,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106870",
"label": "benign",
"label_confidence": 0.739,
"severity": "medium",
"timestamp": "2026-01-05T18:30:00Z",
"trace_id": "73604c06-3c7c-1401-a8d1-5b0f3b6e6737"
} | {
"account_age_days": 938,
"account_id": "ACCT-D1750AE35717",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.621
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 288,
"timestamp": "2026-01-05T06:35:00Z",
"transaction_amount_usd": 20.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2297.08,
"financial_exposure_usd": 3039.82,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107245",
"label": "benign",
"label_confidence": 0.658,
"severity": "medium",
"timestamp": "2026-01-06T00:45:00Z",
"trace_id": "4064d3f7-c792-4f39-521a-db961255939b"
} | {
"account_age_days": 1093,
"account_id": "ACCT-836D08E124A4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.465
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 822,
"timestamp": "2026-01-06T00:45:00Z",
"transaction_amount_usd": 11217.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1241.85,
"financial_exposure_usd": 2396.13,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103605",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "medium",
"timestamp": "2026-01-03T12:05:00Z",
"trace_id": "bfece99f-255a-2df1-850a-decf4501a082"
} | {
"account_age_days": 1453,
"account_id": "ACCT-D55CC7A01979",
"baseline_risk_score": 0.209,
"kyc_tier": "tier_3",
"session_entropy": 0.809
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 557,
"timestamp": "2026-01-03T12:05:00Z",
"transaction_amount_usd": 2290568.37
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.43,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1451931.67,
"financial_exposure_usd": 3385740.48,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107898",
"label": "benign",
"label_confidence": 0.592,
"severity": "medium",
"timestamp": "2026-01-06T11:38:00Z",
"trace_id": "a7febcc3-5b4a-ab48-5bfb-18019fa4552d"
} | {
"account_age_days": 1321,
"account_id": "ACCT-F56215719B91",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_2",
"session_entropy": 0.269
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 377,
"timestamp": "2026-01-06T02:25:00Z",
"transaction_amount_usd": 1.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.541,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2764.15,
"financial_exposure_usd": 3324.49,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101977",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "medium",
"timestamp": "2026-01-02T08:57:00Z",
"trace_id": "d94a432c-8653-2c08-9341-72cad9a5f0cd"
} | {
"account_age_days": 1066,
"account_id": "ACCT-1DB868339BAD",
"baseline_risk_score": 0.641,
"kyc_tier": "tier_1",
"session_entropy": 0.379
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 623,
"timestamp": "2026-01-02T08:57:00Z",
"transaction_amount_usd": 11425.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 621420.04,
"financial_exposure_usd": 1091500.83,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104660",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "critical",
"timestamp": "2026-01-04T05:40:00Z",
"trace_id": "fc02c1e6-8d7a-7eb9-d5a8-ed4b3cac1cd5"
} | {
"account_age_days": 111,
"account_id": "ACCT-6076561B6C72",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_1",
"session_entropy": 0.551
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 815,
"timestamp": "2026-01-04T05:40:00Z",
"transaction_amount_usd": 1650202.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.702,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2032757.06,
"financial_exposure_usd": 4249042.5,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105268",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-04T15:48:00Z",
"trace_id": "0e8b7fea-07aa-e640-41dc-243efbde899b"
} | {
"account_age_days": 1726,
"account_id": "ACCT-6463374F68E9",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_3",
"session_entropy": 0.494
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 233,
"timestamp": "2026-01-04T14:48:00Z",
"transaction_amount_usd": 11.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.919,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2999501.17,
"financial_exposure_usd": 3625140.88,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102396",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "critical",
"timestamp": "2026-01-02T15:56:00Z",
"trace_id": "96b4fa17-39b9-5512-9b9e-e34e87530e1b"
} | {
"account_age_days": 1474,
"account_id": "ACCT-544399194279",
"baseline_risk_score": 0.545,
"kyc_tier": "tier_2",
"session_entropy": 0.702
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1177,
"timestamp": "2026-01-02T15:56:00Z",
"transaction_amount_usd": 14872.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.718,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 495193.17,
"financial_exposure_usd": 1082205.28,
"recoverable_pct": 0.074
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109454",
"label": "benign",
"label_confidence": 0.532,
"severity": "low",
"timestamp": "2026-01-07T13:34:00Z",
"trace_id": "1839ca78-ec78-a6e7-1210-9f0742a098f2"
} | {
"account_age_days": 571,
"account_id": "ACCT-4F21C0AAEE0E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.367
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 212,
"timestamp": "2026-01-07T01:23:00Z",
"transaction_amount_usd": 5.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 558.31,
"financial_exposure_usd": 728.55,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102158",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-02T11:58:00Z",
"trace_id": "583a9417-2edc-ccca-cae4-5390d5097fda"
} | {
"account_age_days": 647,
"account_id": "ACCT-4DD9A09697B6",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_2",
"session_entropy": 0.195
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 960,
"timestamp": "2026-01-02T11:58:00Z",
"transaction_amount_usd": 17601.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.642,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 339138.05,
"financial_exposure_usd": 726228.22,
"recoverable_pct": 0.807
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104911",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "low",
"timestamp": "2026-01-04T09:51:00Z",
"trace_id": "4670e8a2-e04d-728a-59d7-0f0a8643058b"
} | {
"account_age_days": 1240,
"account_id": "ACCT-37BE336CA290",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_3",
"session_entropy": 0.514
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 643,
"timestamp": "2026-01-04T09:51:00Z",
"transaction_amount_usd": 2081486.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.877,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3029001.66,
"financial_exposure_usd": 6161680.5,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107389",
"label": "benign",
"label_confidence": 0.698,
"severity": "low",
"timestamp": "2026-01-06T03:09:00Z",
"trace_id": "81452b76-39e9-e587-a3a6-90d4b8c05ad6"
} | {
"account_age_days": 1399,
"account_id": "ACCT-7C83D420A395",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_2",
"session_entropy": 0.898
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 377,
"timestamp": "2026-01-06T03:09:00Z",
"transaction_amount_usd": 8819.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.562,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1081.18,
"financial_exposure_usd": 1153,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100961",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "low",
"timestamp": "2026-01-01T16:01:00Z",
"trace_id": "49b2bcb4-ccc0-bc32-3a8f-0559520299f1"
} | {
"account_age_days": 1431,
"account_id": "ACCT-4686DE3ABAE3",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_3",
"session_entropy": 0.119
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 213,
"timestamp": "2026-01-01T08:37:00Z",
"transaction_amount_usd": 15.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.746,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 234974.96,
"financial_exposure_usd": 553635.59,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100562",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "critical",
"timestamp": "2026-01-01T09:22:00Z",
"trace_id": "a3d3ea27-88fa-85b9-7a78-7a7cbe274090"
} | {
"account_age_days": 854,
"account_id": "ACCT-CFB4FA80EDA8",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_3",
"session_entropy": 0.628
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 225,
"timestamp": "2026-01-01T09:22:00Z",
"transaction_amount_usd": 46379.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.733,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1188449.28,
"financial_exposure_usd": 1244056.18,
"recoverable_pct": 0.051
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105278",
"label": "fraudulent",
"label_confidence": 0.65,
"severity": "medium",
"timestamp": "2026-01-04T15:58:00Z",
"trace_id": "7234ec3d-84e8-4e41-85c4-19ac6daaf826"
} | {
"account_age_days": 166,
"account_id": "ACCT-A1EC1188B8EC",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.194
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 140,
"timestamp": "2026-01-04T14:15:00Z",
"transaction_amount_usd": 19.92
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.888,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2864043.26,
"financial_exposure_usd": 4970964.15,
"recoverable_pct": 0.857
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109928",
"label": "benign",
"label_confidence": 0.653,
"severity": "medium",
"timestamp": "2026-01-07T21:28:00Z",
"trace_id": "24bdb5fd-71a9-11a6-aa7e-abb0473341ec"
} | {
"account_age_days": 1019,
"account_id": "ACCT-4D256C62F7AB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.905
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 168,
"timestamp": "2026-01-07T09:09:00Z",
"transaction_amount_usd": 2.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1573.68,
"financial_exposure_usd": 2007.05,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105065",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "high",
"timestamp": "2026-01-04T12:25:00Z",
"trace_id": "4a0ece3b-a954-4831-29b9-bbff663165ba"
} | {
"account_age_days": 1323,
"account_id": "ACCT-C341A9A208EC",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_2",
"session_entropy": 0.577
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 121,
"timestamp": "2026-01-04T10:56:00Z",
"transaction_amount_usd": 16.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1129115.96,
"financial_exposure_usd": 1170914.19,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108136",
"label": "benign",
"label_confidence": 0.574,
"severity": "high",
"timestamp": "2026-01-06T15:36:00Z",
"trace_id": "4e56fa8e-ee1c-0dda-7ff5-d522b845b951"
} | {
"account_age_days": 1988,
"account_id": "ACCT-DF13027647DC",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_2",
"session_entropy": 0.221
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 327,
"timestamp": "2026-01-06T09:18:00Z",
"transaction_amount_usd": 4.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 488.97,
"financial_exposure_usd": 719.27,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107376",
"label": "benign",
"label_confidence": 0.738,
"severity": "low",
"timestamp": "2026-01-06T02:56:00Z",
"trace_id": "280ca204-3217-ab87-4428-d92ba81aae7c"
} | {
"account_age_days": 1822,
"account_id": "ACCT-2D967E53FBFA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.644
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 771,
"timestamp": "2026-01-06T02:56:00Z",
"transaction_amount_usd": 11216.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1802.87,
"financial_exposure_usd": 4016.59,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109767",
"label": "benign",
"label_confidence": 0.743,
"severity": "medium",
"timestamp": "2026-01-07T18:47:00Z",
"trace_id": "67c1bb16-29e8-dfa1-0925-4332f649437f"
} | {
"account_age_days": 715,
"account_id": "ACCT-64508813BF5D",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_3",
"session_entropy": 0.549
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 94,
"timestamp": "2026-01-07T18:47:00Z",
"transaction_amount_usd": 4653.77
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2131.17,
"financial_exposure_usd": 3779.95,
"recoverable_pct": 0.444
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105325",
"label": "fraudulent",
"label_confidence": 0.685,
"severity": "low",
"timestamp": "2026-01-04T16:45:00Z",
"trace_id": "c42f2e9b-8e0b-8189-fa88-c955813e3d32"
} | {
"account_age_days": 1447,
"account_id": "ACCT-47E34C886B8A",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_1",
"session_entropy": 0.648
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 484,
"timestamp": "2026-01-04T16:45:00Z",
"transaction_amount_usd": 2843044.07
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.514,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1538322.82,
"financial_exposure_usd": 3133871.74,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109893",
"label": "benign",
"label_confidence": 0.686,
"severity": "low",
"timestamp": "2026-01-07T20:53:00Z",
"trace_id": "d7dc5c4a-a699-570f-d4da-e54e65f05175"
} | {
"account_age_days": 1888,
"account_id": "ACCT-CF88A83FEABC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.457
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 286,
"timestamp": "2026-01-07T20:53:00Z",
"transaction_amount_usd": 10763.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2076.21,
"financial_exposure_usd": 2674.03,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107766",
"label": "benign",
"label_confidence": 0.731,
"severity": "high",
"timestamp": "2026-01-06T09:26:00Z",
"trace_id": "a326da4c-5160-0431-519f-d0b9a5653b1e"
} | {
"account_age_days": 173,
"account_id": "ACCT-29FFDD0F5E44",
"baseline_risk_score": 0.193,
"kyc_tier": "tier_3",
"session_entropy": 0.318
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 820,
"timestamp": "2026-01-06T09:26:00Z",
"transaction_amount_usd": 5873.88
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.658,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3963.91,
"financial_exposure_usd": 5945.32,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104678",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "medium",
"timestamp": "2026-01-04T05:58:00Z",
"trace_id": "7f950a59-74db-d0cb-70cf-2761e13324e1"
} | {
"account_age_days": 1909,
"account_id": "ACCT-ED35262A3BB3",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_2",
"session_entropy": 0.123
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 805,
"timestamp": "2026-01-04T05:58:00Z",
"transaction_amount_usd": 2371671.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.936,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1399335.07,
"financial_exposure_usd": 3022181.09,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104331",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "medium",
"timestamp": "2026-01-04T00:11:00Z",
"trace_id": "c2dce5c3-18c0-0767-5bf3-f2d6ccbd28a8"
} | {
"account_age_days": 1274,
"account_id": "ACCT-88F577788645",
"baseline_risk_score": 0.216,
"kyc_tier": "tier_2",
"session_entropy": 0.107
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 747,
"timestamp": "2026-01-04T00:11:00Z",
"transaction_amount_usd": 1764653.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.692,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1384594.22,
"financial_exposure_usd": 2069081.61,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100210",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "high",
"timestamp": "2026-01-01T03:30:00Z",
"trace_id": "30b6857a-beb6-4fd8-ffc4-d95b8bc135a9"
} | {
"account_age_days": 1065,
"account_id": "ACCT-4A10FF5A9B99",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_2",
"session_entropy": 0.22
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 744,
"timestamp": "2026-01-01T03:30:00Z",
"transaction_amount_usd": 5602.59
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.6,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 430745.94,
"financial_exposure_usd": 442192.52,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108312",
"label": "benign",
"label_confidence": 0.735,
"severity": "low",
"timestamp": "2026-01-06T18:32:00Z",
"trace_id": "02e5c102-77ea-a1c2-9cc9-a29b30c9fe75"
} | {
"account_age_days": 142,
"account_id": "ACCT-868DED7C64F1",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.112
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 145,
"timestamp": "2026-01-06T18:32:00Z",
"transaction_amount_usd": 4454.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.708,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 954.96,
"financial_exposure_usd": 1157.29,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106977",
"label": "benign",
"label_confidence": 0.467,
"severity": "medium",
"timestamp": "2026-01-05T20:17:00Z",
"trace_id": "c197c3b9-2093-3648-f7e4-0c342412ef9a"
} | {
"account_age_days": 793,
"account_id": "ACCT-5A10DFB0C85E",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_2",
"session_entropy": 0.791
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 674,
"timestamp": "2026-01-05T20:17:00Z",
"transaction_amount_usd": 11636.7
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.468,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3030.2,
"financial_exposure_usd": 3377.13,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101920",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "medium",
"timestamp": "2026-01-02T08:00:00Z",
"trace_id": "e42fa4b7-e6ae-e2c1-e24a-63423ccbeaf8"
} | {
"account_age_days": 920,
"account_id": "ACCT-2B1459C82D4A",
"baseline_risk_score": 0.625,
"kyc_tier": "tier_2",
"session_entropy": 0.126
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1062,
"timestamp": "2026-01-02T08:00:00Z",
"transaction_amount_usd": 71540.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.474,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 449073.74,
"financial_exposure_usd": 627406.04,
"recoverable_pct": 0.032
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102534",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "high",
"timestamp": "2026-01-02T18:14:00Z",
"trace_id": "67b02629-ceaf-b618-c23c-8eac27115a86"
} | {
"account_age_days": 40,
"account_id": "ACCT-E570955720A2",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_1",
"session_entropy": 0.112
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 513,
"timestamp": "2026-01-02T18:14:00Z",
"transaction_amount_usd": 96253.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.863,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 472231.2,
"financial_exposure_usd": 942603.27,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108596",
"label": "benign",
"label_confidence": 0.473,
"severity": "low",
"timestamp": "2026-01-06T23:16:00Z",
"trace_id": "9035eb13-0a99-4907-51c3-5eaa8e361f28"
} | {
"account_age_days": 533,
"account_id": "ACCT-94E9D48E3FAA",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_2",
"session_entropy": 0.773
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1105,
"timestamp": "2026-01-06T23:16:00Z",
"transaction_amount_usd": 11076.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3477.03,
"financial_exposure_usd": 5776.57,
"recoverable_pct": 0.747
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103672",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "low",
"timestamp": "2026-01-03T13:12:00Z",
"trace_id": "42c54395-86aa-1fb5-d76f-53b453544020"
} | {
"account_age_days": 409,
"account_id": "ACCT-F22936E98EB8",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_2",
"session_entropy": 0.894
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 284,
"timestamp": "2026-01-03T02:06:00Z",
"transaction_amount_usd": 0.24
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.896,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2172892.26,
"financial_exposure_usd": 3276984.6,
"recoverable_pct": 0.509
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101724",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "medium",
"timestamp": "2026-01-02T04:44:00Z",
"trace_id": "85ef9fa5-56b9-a3e9-a2f1-1922c6b5eb7e"
} | {
"account_age_days": 1056,
"account_id": "ACCT-72DAE86AAC8A",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_3",
"session_entropy": 0.798
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 625,
"timestamp": "2026-01-02T04:44:00Z",
"transaction_amount_usd": 89527.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.86,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 373347.11,
"financial_exposure_usd": 678119.47,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109898",
"label": "benign",
"label_confidence": 0.554,
"severity": "medium",
"timestamp": "2026-01-07T20:58:00Z",
"trace_id": "dcd91d64-4ce6-aea6-c5d0-11d7f38da938"
} | {
"account_age_days": 1158,
"account_id": "ACCT-16B276F4918A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.834
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 582,
"timestamp": "2026-01-07T20:58:00Z",
"transaction_amount_usd": 11922.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.794,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 695.93,
"financial_exposure_usd": 1005.4,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109417",
"label": "benign",
"label_confidence": 0.704,
"severity": "high",
"timestamp": "2026-01-07T12:57:00Z",
"trace_id": "e50cf6fe-9eb9-bfa5-7e57-67a7fa7a085c"
} | {
"account_age_days": 1761,
"account_id": "ACCT-252E8423F6E4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.569
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 320,
"timestamp": "2026-01-07T12:57:00Z",
"transaction_amount_usd": 6733.48
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.602,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 622.93,
"financial_exposure_usd": 652.35,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108789",
"label": "benign",
"label_confidence": 0.663,
"severity": "low",
"timestamp": "2026-01-07T02:29:00Z",
"trace_id": "1de2f77c-84b1-eecb-6011-078681401448"
} | {
"account_age_days": 153,
"account_id": "ACCT-5AB566A62C4E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.355
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 352,
"timestamp": "2026-01-07T02:29:00Z",
"transaction_amount_usd": 9245.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.605,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2532.52,
"financial_exposure_usd": 4519.83,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102566",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "critical",
"timestamp": "2026-01-02T18:46:00Z",
"trace_id": "4b92fff2-1e3c-0e96-3259-99a982d2e146"
} | {
"account_age_days": 1682,
"account_id": "ACCT-73109CBB0211",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_1",
"session_entropy": 0.429
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 164,
"timestamp": "2026-01-02T11:21:00Z",
"transaction_amount_usd": 16.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.893,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 761826,
"financial_exposure_usd": 1042420.56,
"recoverable_pct": 0.304
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102032",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "critical",
"timestamp": "2026-01-02T09:52:00Z",
"trace_id": "ff5e78c9-5416-6d62-274f-4fa4daf20003"
} | {
"account_age_days": 126,
"account_id": "ACCT-B0BFEC99CC95",
"baseline_risk_score": 0.508,
"kyc_tier": "tier_3",
"session_entropy": 0.455
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 322,
"timestamp": "2026-01-02T04:44:00Z",
"transaction_amount_usd": 10.91
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.447,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1014550.33,
"financial_exposure_usd": 1064962,
"recoverable_pct": 0.037
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108363",
"label": "benign",
"label_confidence": 0.617,
"severity": "critical",
"timestamp": "2026-01-06T19:23:00Z",
"trace_id": "139de417-6fc5-3077-36e1-735fd093180b"
} | {
"account_age_days": 1642,
"account_id": "ACCT-68EA15F8B427",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.233
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1130,
"timestamp": "2026-01-06T19:23:00Z",
"transaction_amount_usd": 4778.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.689,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3597.56,
"financial_exposure_usd": 3802.03,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109623",
"label": "benign",
"label_confidence": 0.467,
"severity": "low",
"timestamp": "2026-01-07T16:23:00Z",
"trace_id": "902e6146-c865-0c41-f375-9b41dc4649d0"
} | {
"account_age_days": 625,
"account_id": "ACCT-D2F4EDDC7E1D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.587
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 168,
"timestamp": "2026-01-07T11:00:00Z",
"transaction_amount_usd": 8.09
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3095.16,
"financial_exposure_usd": 3920.55,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103803",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "low",
"timestamp": "2026-01-03T15:23:00Z",
"trace_id": "578ce9b7-8ed8-bc5d-82f0-8de6eca8e14e"
} | {
"account_age_days": 260,
"account_id": "ACCT-E062FCAE2B54",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_3",
"session_entropy": 0.931
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1066,
"timestamp": "2026-01-03T15:23:00Z",
"transaction_amount_usd": 937355.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.486,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 7584198.06,
"financial_exposure_usd": 7629367.45,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109458",
"label": "benign",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-07T13:38:00Z",
"trace_id": "70880102-5179-27f5-f7f0-5ad0ae25a907"
} | {
"account_age_days": 1118,
"account_id": "ACCT-809A957D4D02",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.717
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 732,
"timestamp": "2026-01-07T13:38:00Z",
"transaction_amount_usd": 2881.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.725,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 498.49,
"financial_exposure_usd": 699.37,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107144",
"label": "benign",
"label_confidence": 0.641,
"severity": "low",
"timestamp": "2026-01-05T23:04:00Z",
"trace_id": "65e44ed1-cc8b-d927-a2d3-385e13cb3915"
} | {
"account_age_days": 10,
"account_id": "ACCT-EDC51DE31FB7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.585
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 285,
"timestamp": "2026-01-05T23:04:00Z",
"transaction_amount_usd": 8021.18
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1315.48,
"financial_exposure_usd": 3080.84,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105523",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "low",
"timestamp": "2026-01-04T20:03:00Z",
"trace_id": "045e72d6-8d3b-31a2-1d9c-0e840de04c18"
} | {
"account_age_days": 1800,
"account_id": "ACCT-C7BF044F5F95",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_1",
"session_entropy": 0.577
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 665,
"timestamp": "2026-01-04T20:03:00Z",
"transaction_amount_usd": 204511.78
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.924,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 644332.69,
"financial_exposure_usd": 1576082.33,
"recoverable_pct": 0.89
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100426",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-01T07:06:00Z",
"trace_id": "a06a5d3a-438b-f10a-1357-d2fe2a8f29ce"
} | {
"account_age_days": 342,
"account_id": "ACCT-61CADF6B429A",
"baseline_risk_score": 0.609,
"kyc_tier": "tier_1",
"session_entropy": 0.67
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 330,
"timestamp": "2025-12-31T19:34:00Z",
"transaction_amount_usd": 23.08
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.507,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 443349.31,
"financial_exposure_usd": 854244.57,
"recoverable_pct": 0.275
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108750",
"label": "benign",
"label_confidence": 0.492,
"severity": "medium",
"timestamp": "2026-01-07T01:50:00Z",
"trace_id": "01d86a5a-99ab-8483-200c-198190b6296f"
} | {
"account_age_days": 1289,
"account_id": "ACCT-18A10D3B1024",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.502
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 379,
"timestamp": "2026-01-06T15:39:00Z",
"transaction_amount_usd": 22.23
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 981.35,
"financial_exposure_usd": 1379.86,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104769",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "medium",
"timestamp": "2026-01-04T07:29:00Z",
"trace_id": "7a7de120-2ee4-1b04-0a49-b149f4dd51a9"
} | {
"account_age_days": 638,
"account_id": "ACCT-E24B1096E8C1",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_3",
"session_entropy": 0.811
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 365,
"timestamp": "2026-01-04T00:01:00Z",
"transaction_amount_usd": 17.14
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.576,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 591512.54,
"financial_exposure_usd": 1205183.36,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109039",
"label": "benign",
"label_confidence": 0.746,
"severity": "high",
"timestamp": "2026-01-07T06:39:00Z",
"trace_id": "49d6b849-053d-7a09-c1c6-1e6aaf3dc518"
} | {
"account_age_days": 275,
"account_id": "ACCT-EAE08B2B1AD3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.82
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 953,
"timestamp": "2026-01-07T06:39:00Z",
"transaction_amount_usd": 2669.91
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.528,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 930.02,
"financial_exposure_usd": 1707.84,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106868",
"label": "benign",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-05T18:28:00Z",
"trace_id": "c1d66a30-de34-0c5d-63c9-22b4098907b5"
} | {
"account_age_days": 1005,
"account_id": "ACCT-B10FBF0FB8A2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.765
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 466,
"timestamp": "2026-01-05T18:28:00Z",
"transaction_amount_usd": 13843.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.793,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 7000.95,
"financial_exposure_usd": 8660.66,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109840",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-07T20:00:00Z",
"trace_id": "75f11cae-49e0-14e3-8ce7-170831ac49d6"
} | {
"account_age_days": 250,
"account_id": "ACCT-20CA60854FEB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.612
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 119,
"timestamp": "2026-01-07T16:52:00Z",
"transaction_amount_usd": 22.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 910.01,
"financial_exposure_usd": 1025.64,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102820",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-02T23:00:00Z",
"trace_id": "9d07007a-5deb-3496-2c63-ff61af14624f"
} | {
"account_age_days": 303,
"account_id": "ACCT-EC41375247ED",
"baseline_risk_score": 0.63,
"kyc_tier": "tier_1",
"session_entropy": 0.374
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 171,
"timestamp": "2026-01-02T20:41:00Z",
"transaction_amount_usd": 7.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.383,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 926139.13,
"financial_exposure_usd": 1494356.73,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100080",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-01T01:20:00Z",
"trace_id": "761ad914-4931-b2d4-d3de-f87cc60fb252"
} | {
"account_age_days": 28,
"account_id": "ACCT-9F601D1700E7",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_2",
"session_entropy": 0.751
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1029,
"timestamp": "2026-01-01T01:20:00Z",
"transaction_amount_usd": 73769.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.863,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 786883.65,
"financial_exposure_usd": 1028888.03,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108333",
"label": "benign",
"label_confidence": 0.731,
"severity": "medium",
"timestamp": "2026-01-06T18:53:00Z",
"trace_id": "7b0ba4bb-5a7b-0dbb-fc93-518c377f4796"
} | {
"account_age_days": 1624,
"account_id": "ACCT-F4A2C123C26E",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_3",
"session_entropy": 0.432
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1014,
"timestamp": "2026-01-06T18:53:00Z",
"transaction_amount_usd": 11028.88
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4979.73,
"financial_exposure_usd": 5974.52,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104055",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "critical",
"timestamp": "2026-01-03T19:35:00Z",
"trace_id": "b79973dc-d2f2-34c7-1554-352b094b4b20"
} | {
"account_age_days": 1805,
"account_id": "ACCT-2C5A5350A1E7",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_3",
"session_entropy": 0.715
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 858,
"timestamp": "2026-01-03T19:35:00Z",
"transaction_amount_usd": 2906600.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.626,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2208561.77,
"financial_exposure_usd": 5307686.64,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108542",
"label": "benign",
"label_confidence": 0.59,
"severity": "low",
"timestamp": "2026-01-06T22:22:00Z",
"trace_id": "1263ffb8-474a-0eaa-0ef7-8978294d0d21"
} | {
"account_age_days": 1515,
"account_id": "ACCT-9B6DD90901AD",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_1",
"session_entropy": 0.292
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 538,
"timestamp": "2026-01-06T22:22:00Z",
"transaction_amount_usd": 5256.59
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.749,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4439.27,
"financial_exposure_usd": 4800.41,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101995",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-02T09:15:00Z",
"trace_id": "7f48232b-7763-be0f-9f5c-009de038735d"
} | {
"account_age_days": 127,
"account_id": "ACCT-BFFD2A908AFB",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_2",
"session_entropy": 0.748
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 237,
"timestamp": "2026-01-02T03:18:00Z",
"transaction_amount_usd": 22.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.655,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 244729.06,
"financial_exposure_usd": 554018.84,
"recoverable_pct": 0.145
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101914",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-02T07:54:00Z",
"trace_id": "83af7eef-fb64-4578-69ed-09811aff4df8"
} | {
"account_age_days": 1705,
"account_id": "ACCT-F1A016520E3E",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_3",
"session_entropy": 0.202
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 566,
"timestamp": "2026-01-02T07:54:00Z",
"transaction_amount_usd": 47002.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.828,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 241348.66,
"financial_exposure_usd": 483860.12,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103550",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-03T11:10:00Z",
"trace_id": "9ad9d947-47eb-10f4-0bee-80970e2d3f34"
} | {
"account_age_days": 414,
"account_id": "ACCT-6ECD0196C4E5",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_2",
"session_entropy": 0.688
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 210,
"timestamp": "2026-01-02T23:30:00Z",
"transaction_amount_usd": 5.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.416,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6436338.69,
"financial_exposure_usd": 7270485.25,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104389",
"label": "fraudulent",
"label_confidence": 0.64,
"severity": "critical",
"timestamp": "2026-01-04T01:09:00Z",
"trace_id": "0d5c1cd3-242d-0c9d-31d3-a1f40e0c08ea"
} | {
"account_age_days": 859,
"account_id": "ACCT-9C7EE288BE05",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.511
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 82,
"timestamp": "2026-01-04T01:09:00Z",
"transaction_amount_usd": 2209737.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.759,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1935304.56,
"financial_exposure_usd": 1936269.2,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105639",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "medium",
"timestamp": "2026-01-04T21:59:00Z",
"trace_id": "e991d474-2bd6-6650-b69e-1f86d7b7c7ae"
} | {
"account_age_days": 575,
"account_id": "ACCT-39C4C1E07FCF",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_1",
"session_entropy": 0.869
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 286,
"timestamp": "2026-01-04T21:59:00Z",
"transaction_amount_usd": 2764275.26
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.884,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3378885.54,
"financial_exposure_usd": 5817445.56,
"recoverable_pct": 0.97
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103382",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "medium",
"timestamp": "2026-01-03T08:22:00Z",
"trace_id": "6bf8829d-7329-bd14-8819-81257316a212"
} | {
"account_age_days": 1901,
"account_id": "ACCT-9B5A74AA74B2",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_1",
"session_entropy": 0.835
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 866,
"timestamp": "2026-01-03T08:22:00Z",
"transaction_amount_usd": 1733228.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.88,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2949843.57,
"financial_exposure_usd": 6506065.8,
"recoverable_pct": 0.605
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102831",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "medium",
"timestamp": "2026-01-02T23:11:00Z",
"trace_id": "d55207c1-c75a-abeb-f890-a9f5b25d39bb"
} | {
"account_age_days": 1753,
"account_id": "ACCT-55CE14A078DD",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.822
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 390,
"timestamp": "2026-01-02T13:04:00Z",
"transaction_amount_usd": 12.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.504,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 870200.43,
"financial_exposure_usd": 1001170.38,
"recoverable_pct": 0.223
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107149",
"label": "benign",
"label_confidence": 0.502,
"severity": "high",
"timestamp": "2026-01-05T23:09:00Z",
"trace_id": "ca02484e-23e6-05b5-a532-3d716bd75619"
} | {
"account_age_days": 12,
"account_id": "ACCT-0C855AFA89A3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.3
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 209,
"timestamp": "2026-01-05T23:09:00Z",
"transaction_amount_usd": 237.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.775,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1546.29,
"financial_exposure_usd": 3420.4,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103623",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "high",
"timestamp": "2026-01-03T12:23:00Z",
"trace_id": "c753b843-3ff3-ad3e-7eb5-b3a38ff8d83e"
} | {
"account_age_days": 1386,
"account_id": "ACCT-DDDCC22ECE74",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.932
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 249,
"timestamp": "2026-01-03T12:23:00Z",
"transaction_amount_usd": 2630859.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.791,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1967831.74,
"financial_exposure_usd": 2288640.36,
"recoverable_pct": 0.894
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107109",
"label": "benign",
"label_confidence": 0.74,
"severity": "medium",
"timestamp": "2026-01-05T22:29:00Z",
"trace_id": "3fec9f43-1793-51ac-ab9d-308630d8a5b4"
} | {
"account_age_days": 1435,
"account_id": "ACCT-3F3559D5C8E0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.235
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 667,
"timestamp": "2026-01-05T22:29:00Z",
"transaction_amount_usd": 1689.58
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.662,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 109.6,
"financial_exposure_usd": 177.27,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105820",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "low",
"timestamp": "2026-01-05T01:00:00Z",
"trace_id": "4f636e76-cfaa-f2ab-b55e-a2e70616ede3"
} | {
"account_age_days": 1605,
"account_id": "ACCT-C9C8097F9796",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_2",
"session_entropy": 0.123
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1010,
"timestamp": "2026-01-05T01:00:00Z",
"transaction_amount_usd": 966927.59
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.361,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3024802.77,
"financial_exposure_usd": 3777183.48,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103114",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "critical",
"timestamp": "2026-01-03T03:54:00Z",
"trace_id": "348ccac2-9e56-7203-b38f-3973d7fec3f6"
} | {
"account_age_days": 657,
"account_id": "ACCT-C89638041B25",
"baseline_risk_score": 0.555,
"kyc_tier": "tier_1",
"session_entropy": 0.759
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 468,
"timestamp": "2026-01-03T03:54:00Z",
"transaction_amount_usd": 52306.47
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.475,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 382981.34,
"financial_exposure_usd": 828004.47,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107873",
"label": "benign",
"label_confidence": 0.681,
"severity": "medium",
"timestamp": "2026-01-06T11:13:00Z",
"trace_id": "8f3357d1-4b92-38e9-fd41-63375498f4c8"
} | {
"account_age_days": 1712,
"account_id": "ACCT-A97D83648E5D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.466
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 371,
"timestamp": "2026-01-06T00:40:00Z",
"transaction_amount_usd": 24.12
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.479,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4156.59,
"financial_exposure_usd": 6984.86,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104793",
"label": "fraudulent",
"label_confidence": 0.738,
"severity": "low",
"timestamp": "2026-01-04T07:53:00Z",
"trace_id": "18bcd683-6298-aecc-5014-2f177519d24e"
} | {
"account_age_days": 212,
"account_id": "ACCT-5F6A93EADD32",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_2",
"session_entropy": 0.869
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 873,
"timestamp": "2026-01-04T07:53:00Z",
"transaction_amount_usd": 213119.55
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.53,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 4532203.54,
"financial_exposure_usd": 5320009.91,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104143",
"label": "fraudulent",
"label_confidence": 0.717,
"severity": "critical",
"timestamp": "2026-01-03T21:03:00Z",
"trace_id": "a79aaec4-e7a8-2140-ca10-90befdb5ebad"
} | {
"account_age_days": 1401,
"account_id": "ACCT-DB34F5FD4B73",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_1",
"session_entropy": 0.807
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 788,
"timestamp": "2026-01-03T21:03:00Z",
"transaction_amount_usd": 206081.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.495,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1780576.72,
"financial_exposure_usd": 3154169.4,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109047",
"label": "benign",
"label_confidence": 0.461,
"severity": "high",
"timestamp": "2026-01-07T06:47:00Z",
"trace_id": "b61f2e41-d862-86d0-f96e-81d52a2038b9"
} | {
"account_age_days": 1744,
"account_id": "ACCT-177F484BD62D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.261
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 554,
"timestamp": "2026-01-07T06:47:00Z",
"transaction_amount_usd": 11500.03
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.539,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 577,
"financial_exposure_usd": 1200.02,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103027",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "medium",
"timestamp": "2026-01-03T02:27:00Z",
"trace_id": "f084eadd-fac1-a2ba-efe8-8c2e11f9cca5"
} | {
"account_age_days": 1428,
"account_id": "ACCT-972E9A2FE5B6",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_2",
"session_entropy": 0.743
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 152,
"timestamp": "2026-01-03T02:27:00Z",
"transaction_amount_usd": 57263.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.574,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 663442.88,
"financial_exposure_usd": 774371.5,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101911",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "high",
"timestamp": "2026-01-02T07:51:00Z",
"trace_id": "9603059a-4bfe-20a4-ac18-4b2bf2663fad"
} | {
"account_age_days": 523,
"account_id": "ACCT-98D0D9D0E96D",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_1",
"session_entropy": 0.539
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 388,
"timestamp": "2026-01-02T07:51:00Z",
"transaction_amount_usd": 77534.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.514,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 662644.22,
"financial_exposure_usd": 880523.95,
"recoverable_pct": 0.312
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107262",
"label": "benign",
"label_confidence": 0.48,
"severity": "low",
"timestamp": "2026-01-06T01:02:00Z",
"trace_id": "cd03071e-e3ac-66bf-1e9c-928d15bce0c3"
} | {
"account_age_days": 869,
"account_id": "ACCT-E901929BA9BD",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_1",
"session_entropy": 0.534
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 462,
"timestamp": "2026-01-06T01:02:00Z",
"transaction_amount_usd": 10358.32
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 279.54,
"financial_exposure_usd": 564.77,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103151",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "medium",
"timestamp": "2026-01-03T04:31:00Z",
"trace_id": "9fe543fe-eb96-84d0-b3b8-1369dece4fdd"
} | {
"account_age_days": 872,
"account_id": "ACCT-9471CA328BD6",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_3",
"session_entropy": 0.887
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 305,
"timestamp": "2026-01-02T22:08:00Z",
"transaction_amount_usd": 8.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.868,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 697208.09,
"financial_exposure_usd": 791842.96,
"recoverable_pct": 0.247
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102342",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "critical",
"timestamp": "2026-01-02T15:02:00Z",
"trace_id": "bdda6bd4-c620-41d5-6357-b246a017825a"
} | {
"account_age_days": 1547,
"account_id": "ACCT-3EFA8DF35FBF",
"baseline_risk_score": 0.584,
"kyc_tier": "tier_1",
"session_entropy": 0.328
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 879,
"timestamp": "2026-01-02T15:02:00Z",
"transaction_amount_usd": 54953.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.664,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 326070.53,
"financial_exposure_usd": 767020.49,
"recoverable_pct": 0.35
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100358",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "critical",
"timestamp": "2026-01-01T05:58:00Z",
"trace_id": "b8bd0a51-85ce-6937-afcd-eb63e8b7b97d"
} | {
"account_age_days": 246,
"account_id": "ACCT-3856167524F8",
"baseline_risk_score": 0.621,
"kyc_tier": "tier_2",
"session_entropy": 0.656
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 282,
"timestamp": "2026-01-01T02:59:00Z",
"transaction_amount_usd": 19.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.652,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 745241.74,
"financial_exposure_usd": 753974.56,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103641",
"label": "fraudulent",
"label_confidence": 0.621,
"severity": "high",
"timestamp": "2026-01-03T12:41:00Z",
"trace_id": "c5779c89-a042-9c89-11cf-e2b8749cbea8"
} | {
"account_age_days": 1999,
"account_id": "ACCT-2A05A2FF2815",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_2",
"session_entropy": 0.571
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 944,
"timestamp": "2026-01-03T12:41:00Z",
"transaction_amount_usd": 1127378.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.728,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2187808.63,
"financial_exposure_usd": 4209739.93,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103127",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "high",
"timestamp": "2026-01-03T04:07:00Z",
"trace_id": "464b116a-a6a1-2b0d-64fe-cecf1f355a52"
} | {
"account_age_days": 790,
"account_id": "ACCT-8E383F4DBDD7",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_2",
"session_entropy": 0.249
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 821,
"timestamp": "2026-01-03T04:07:00Z",
"transaction_amount_usd": 21576.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.73,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 539832.88,
"financial_exposure_usd": 803301.72,
"recoverable_pct": 0.155
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103759",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "high",
"timestamp": "2026-01-03T14:39:00Z",
"trace_id": "5b68fde8-7798-dbed-8161-0ad3427349bf"
} | {
"account_age_days": 1219,
"account_id": "ACCT-A003F732EFF1",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_1",
"session_entropy": 0.486
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 327,
"timestamp": "2026-01-03T14:39:00Z",
"transaction_amount_usd": 849613.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.719,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3417669.78,
"financial_exposure_usd": 7445184.45,
"recoverable_pct": 0.857
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102376",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-02T15:36:00Z",
"trace_id": "264df62e-4f0b-5ed1-be14-a4b387734f4f"
} | {
"account_age_days": 1994,
"account_id": "ACCT-CBB7DC6025AE",
"baseline_risk_score": 0.54,
"kyc_tier": "tier_3",
"session_entropy": 0.942
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 382,
"timestamp": "2026-01-02T09:45:00Z",
"transaction_amount_usd": 23.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.835,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 805664.66,
"financial_exposure_usd": 1011977.33,
"recoverable_pct": 0.282
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107542",
"label": "benign",
"label_confidence": 0.728,
"severity": "medium",
"timestamp": "2026-01-06T05:42:00Z",
"trace_id": "6773cad6-7a9a-280f-8c11-e369061d462c"
} | {
"account_age_days": 1702,
"account_id": "ACCT-CADD8C59AB68",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.658
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1167,
"timestamp": "2026-01-06T05:42:00Z",
"transaction_amount_usd": 7411.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.562,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4148.89,
"financial_exposure_usd": 7967.98,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107689",
"label": "benign",
"label_confidence": 0.53,
"severity": "medium",
"timestamp": "2026-01-06T08:09:00Z",
"trace_id": "8960b5a6-e2f5-c28f-834c-1b0f5d029602"
} | {
"account_age_days": 1780,
"account_id": "ACCT-9EBC54D8A9FC",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_2",
"session_entropy": 0.665
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1025,
"timestamp": "2026-01-06T08:09:00Z",
"transaction_amount_usd": 12412.23
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.477,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1517.63,
"financial_exposure_usd": 3030.61,
"recoverable_pct": 0.524
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.